Sciweavers

2237 search results - page 67 / 448
» On the Security of Random Sources
Sort
View
MST
2008
80views more  MST 2008»
15 years 4 months ago
A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange
Abstract The transformation protocol can allow two players to share an unconditionally secure secret key using a random deal of cards. A sufficient condition on the number of cards...
Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki
FSE
2005
Springer
108views Cryptology» more  FSE 2005»
15 years 10 months ago
Unbiased Random Sequences from Quasigroup String Transformations
Abstract. The need of true random number generators for many purposes (ranging from applications in cryptography and stochastic simulation, to search heuristics and game playing) i...
Smile Markovski, Danilo Gligoroski, Ljupco Kocarev
143
Voted
CIKM
2005
Springer
15 years 10 months ago
Query expansion using random walk models
It has long been recognized that capturing term relationships is an important aspect of information retrieval. Even with large amounts of data, we usually only have significant ev...
Kevyn Collins-Thompson, Jamie Callan
170
Voted
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
15 years 11 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
ACISP
2008
Springer
15 years 6 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...